Comment

Cloud computing under siege

eye in the sky

The benefits of cloud computing can hardly be overstated. By pooling computing resources, cloud computing not only offers significant cost savings over traditional software and hardware products, it facilitates innovation by allowing users, businesses and governments to procure, rapidly and cheaply, a diversity of software, analytics and storage services.

The global market has clearly noted these advantages: In 2014, companies are expected to spend more than $100 billion on cloud services globally.

Despite these considerable benefits, however, globally distributed cloud computing has recently come under threat. Over the past year, in response to mounting concerns over data privacy, data security and the rise of online surveillance, governments around the world have been seeking to pass new data protection rules.

Several governments, including Germany and Brazil, have considered enacting “data localization” laws that would require the storage, analysis and processing of citizen and corporate data to occur only within their borders. Proponents of these rules assert that by keeping data storage and processing close to home, they can provide their citizens and corporations with better defenses against foreign surveillance and protection from the ambiguities of international data privacy rules.

Yet many of these proposals are likely to impose economic harm without achieving any of their stated goals. For example, several of the proposals under consideration would force companies to build servers in locations where the high price of local energy and the lack of trained engineers could translate into higher costs and reduced efficiencies. Data localization policies would also result in a sub-optimal deployment of servers and excessive cost, as each country seeks to build its own array for local use. Moreover, policies that restrict information flows are unlikely to address key security and privacy objectives. Requiring that data reside in a server based in Germany instead of one in Ireland or America will do little to prevent spies from accessing that data if they are determined and capable.

Localization policies also overlook the growing threats from sophisticated criminal groups that are targeting cloud-based servers for use in distributed denial of service attacks. These criminals do not care where a server resides; they simply want to take it over and use it for their purposes. Once a server is compromised, its contents become easy prey for criminals and spies alike.

Ultimately, security is not a function of the geography of a server. It is the product of comprehensive security practices, state-of-the art technology, and most importantly, support from world-class cybersecurity talent. As former U.S. federal CIO Vivek Kundra has stated, “cloud computing is often far more secure than traditional computing, because companies like Google and Amazon can attract and retain cybersecurity personnel.” Requiring data to be stored in countries where there are few first-rate computer security professionals may increase rather than decrease security risks.

Cyber espionage, cybercrime, and the preservation of privacy are legitimate concerns that deserve appropriate policy responses. International laws and agreements regarding data jurisdiction are in need of urgent clarification and reform. However, those technical, legal and normative problems can be addressed without erecting virtual walls around national borders or restricting users’ access to global services and technologies.

For example, the use of encryption for data both at rest and in motion would be hugely beneficial. Encryption might not prevent sophisticated intelligence agencies from gathering and analyzing targeted information, but widespread use of encryption would make mass surveillance and data theft more difficult, whether conducted by governments or other sophisticated hackers.

Another option, which is currently being considered by the European Union, is to develop guidance on the use of cloud computing and data transfers and require providers to meet that guidance. The EU would also reserve the right to conduct “prior checks” of cloud providers to verify that they are complying with its regulations. While the details of this model have yet to be worked out, and one can imagine challenges in making it work effectively and efficiently, a policy-based approach of this kind is preferable to a data localization policy that precludes global competition.

In the end, the best approach will likely include both technological solutions and policy guidelines shaped by international data standards. Yet it is clear that restricting international access to the services offered by cloud computing -- services which rely on the efficiency gains achieved through a distributed network of servers and users across the globe -- will increase costs for individuals and businesses, and potentially reduce rather than improve overall security.

The history of international trade has shown that walls and restrictions rarely succeed in achieving their stated goals. It is critical that both policymakers and technology providers work together to develop solutions that keep the flow of information and online services available to all who rely on them.

About the Authors

Bob Butler is an adjunct senior fellow at the Center for New American Security. He is also the chief security officer for IO Data Centers LLC and served as the first deputy assistant secretary of Defense for cyber policy.

Irving Lachow is a senior associate (non-resident) at the Center for Strategic and International Studies.

Jonah Force Hill is a technology and policy consultant and the author of the recent Lawfare Research Paper, "The Growth of Data Localization Post-Snowden."

Featured

  • Telecommunications
    Stock photo ID: 658810513 By asharkyu

    GSA extends EIS deadline to 2023

    Agencies are getting up to three more years on existing telecom contracts before having to shift to the $50 billion Enterprise Infrastructure Solutions vehicle.

  • Workforce
    Shutterstock image ID: 569172169 By Zenzen

    OMB looks to retrain feds to fill cyber needs

    The federal government is taking steps to fill high-demand, skills-gap positions in tech by retraining employees already working within agencies without a cyber or IT background.

  • Acquisition
    GSA Headquarters (Photo by Rena Schild/Shutterstock)

    GSA to consolidate multiple award schedules

    The General Services Administration plans to consolidate dozens of its buying schedules across product areas including IT and services to reduce duplication.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.